Inet-3.0: Internet Topology Generator

Size: px
Start display at page:

Download "Inet-3.0: Internet Topology Generator"

Transcription

1 Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin CSE-TR Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet topology generator. Our understanding of the Internet topology is quickly evolving, and thus, our understanding of how synthetic topologies should be generated is changing too. We document our analysis of Inet- 2.2, which highlighted two shortcomings in its topologies. Inet-3. improves upon Inet-2.2 s two main weaknesses by creating topologies with more accurate degree distributions and minimum vertex covers as compared to Internet topologies. We also examine numerous other metrics to show that Inet- 3. better approximates the actual Internet AS topology than does Inet-2.2. Inet-3. s topologies still do not well represent the Internet in terms of maximum clique size and clustering coefficient. These related problems stress a need for a better understanding of Internet connectivity and will be addressed in future work. This project is funded in part by NSF grant number ANI and by ONR grant number N467. Sugih Jamin is further supported by the NSF CAREER Award ANI , the Presidential Early Career Award for Scientists and Engineers (PECASE) 998, and the Alfred P. Sloan Foundation Research Fellowship 2. Additional funding is provided by AT&T Research, and by equipment grants from Sun Microsystems Inc. and Compaq Corp.

2 NAME inet - an AS-level Internet topology generator. SYNOPSIS inet -n N [-d k] [-p n] [-s sd] [-f of] DESCRIPTION The Inet generator generates an AS-level representation of the Internet. It is important to note that Inet only provides the connectivity information; the generated topologies do not have any information pertaining to latency, bandwidth etc. It generates random networks with characteristics similar to those of the Internet from November 997 to Feb 22, and beyond. The generator should be used to generate network of no less than 337 nodes, which is the number of ASs on the Internet in November 997. The software package with source code for Unix, can be found at: OPTIONS -n N: the total number of nodes in the topology. -d k: the fraction of degree-one nodes. Default is. -p n: the size of the plane used for node placement. Default is,. -s sd: the seed to initialize the random number generator. Default is. -f of: the debugging output file name. Default is stderr. EXAMPLES To generate a 6,-node network with default values: example% inet -n 6 > Inet.6 To generate a 6,-node network on a, by, plane with 3% of total nodes as degree-one nodes, random seed of 6, and debug file debug: example% inet -n 6 -f debug -d.3 -s 6 -p > Inet.6 OUTPUT FORMAT The output of inet follows the following format: nodes links id x y id id2 weight The first line of the output specifies the number of nodes with nodes, and the number of undirected links with links. The next section contains the location of each node. Each line contains the node id, id, and the xy-coordinate, x and y. The last section contains the list of links in the topology. Each line contains the ids of the two nodes incident to the link, id and id2, and the link weight, weight (reserved). 2

3 Overview In [5], we compared Inet-2.2 to several other popular Internet topology generators. Using the properties of Internet AS topologies identified in [3], it was shown that Inet-2.2 performed as well as or better than other Internet topology generators. Therefore in this report, we forgo the comparison to other topology generators, and focus on a comparison between Inet-2.2, Inet-3., and Internet topologies. We first examine two properties of Inet-2.2 topologies that are not faithful to those found in Internet topologies. This analysis lead us to two simple, yet powerful, modifications that form the basis of our update to Inet. To verify Inet-3., we extend the metrics from [5] to include several others. We show that in comparison to Inet-2.2, Inet-3. generates topologies that are more faithful to Internet topologies. While we show that Inet-3. is more successful than Inet-2.2 in generating Internet-like topologies, we also highlight and discuss known discrepancies between Inet-3. and Internet topologies. 2 Internet Data For our Internet topologies, we obtained raw BGP table information from The National Laboratory for Applied Network Research (NLANR) [8] and The University of Oregon Route Views Project []. Both of these sites collect BGP routing tables from the route server route-views.oregon-ix.net. From this raw BGP table data, we extracted connectivity information into a simple adjacency list of ASs. Our data set consists of 5 Internet topologies from November 997 to February Analysis of Inet-2.2 Topologies Looking only at the characteristics analyzed in [5], we would think that Inet-2.2 topologies were almost identical to Internet topologies. It is clear though, that there are many properties that characterize a topology that were not evaluated in [5]. Unfortunately, neither the networking community, nor the graph theory community, have been able to find one unifying metric which fully describes a topology. Therefore we are forced to analyze as many metrics as possible, in an attempt to characterize and understand the Internet AS level topology. Our analysis focuses on two properties of a graph, one relating to degree distribution, and the other to connectivity. In terms of degree distribution, we look at the complementary cumulative distribution function (ccdf) F (d) = i>d f(d), which is the fraction of nodes with degree greater than d. With respect to connectivity, we examine the ratio of the minimum vertex cover of a graph to the size of the graph, V C /n. In the next two subsections, we analyze Inet-2.2 in terms of these metrics, and then describe the modifications in these areas that we made for Inet Distribution - ccdf In 999, Faloutsos et al. [3] found several power laws relating to the topology of the Internet. One of these power laws was f(d) d O, that is, the frequency of nodes with degree d, is proportional to d raised to a power of a constant O. Unfortunately, this power law holds only if.5 to 2% of the highest degree nodes are removed from the data, as was noted in [5]. While this small percent may seem unsubstantial initially, this percentage of top degree nodes accounts for over /3 of the total degrees in the Internet. Due to this weakness of the Frequency-Outdegree power law, we instead look at the complementary cumulative distribution function F (d) = i>d f(d) which exhibits the power law F (d) d α () 3

4 . - CDF(Outdegree)... - CDF(Outdegree).. e-5. e-6 Outdegree Figure : F (d) for all d. Top 3 nodes do not fit power law. Outdegree Figure 2: F (d) with top 3 nodes excluded. This power law has been used by others [, 2], as it describes the degrees of all but about the top 3 nodes as seen in Fig.. Fig. 2 shows F (d) for the Internet topology in February 2, along with an equal sized Inet-2.2 topology. While we see that Inet-2.2 s degree distribution is close to that of the Internet, clearly there is room for improvement. As is described in [5], Inet-2.2 relies on exponential growth laws. As an extension of the power law f(d) d O, it is shown that f(d) = e at+b d O, where a,b, and O are know constants and t is the number of months since November 997. To calculate a degree distribution for a given size topology N, Inet-2.2 simply uses the exponential growth rate of the number of ASs to calculate the number of months t it would take the Internet to grow from its size in November 997 to N. Recall that this power law can not be used to generate degrees for the top 2% of nodes. We would thus like to use Eq. to generate degrees, as it can be used for all but the top 3 nodes. Eq. would only be useful for this purpose if we could appropriately model it over time, as we did with the Frequency-Outdegree power law. For each of our Internet topologies from November 997 to February 22, we plotted F (d) for all degrees, except degree nodes and the top 3 degrees. Using linear regression, we fit a line to each Internet data set as seen in Fig. 3. The slope of this line corresponds to α in F (d) d α. Fig. 4 shows the values of α over time. Fig. 5 shows the y-intercept over time. Rather than a constant exponent and variable intercept as was seen over time for f(d), we have a variable exponent and relatively constant intercept over time for F (d). The correlation coefficient for the exponents is 7, while the correlation coefficient for the intercepts is -5. This translates to having a relatively constant fraction of low degree nodes, with the degrees of the top nodes exponentially increasing. This leads us to a new exponential growth law: F (d) = e c d at+b (2) where c, a, and b are known constants and t is the number of months since November 997. In Inet-3., we use Eq. 2 to calculate the degree distribution for all but degree nodes and the top 3 nodes. As seen in section, the fraction of degree nodes is left up to the user. As the fraction of degree ASs on the Internet has remained steady around, the default of this value is set to. We use the Outdegree-Rank exponential growth law defined in [5] to calculate the degrees of the top 3 nodes as is Internet growth rate has been less than exponential lately. However this does not completely invalidate the approach we adopted here. For a topology of a given size, Inet simply places it at an earlier time than it actually may be at. Since the age of the topology is neither a user controlled parameter nor an output of Inet, its value and use is transparent to the users. 4

5 . - CDF(Outdegree)... Outdegree Figure 3: Lines fitting F (d) for each of 5 Internet topologies..6.8 y =.324*x.22 slope of ccdf Outdegree Frequency curve (Nov. 997 Feb. 22) slope linear Figure 4: Relationship of ccdf power law exponent and time. Intercept of ccdf Frequency-Outdegree curve Figure 5: Relationship of ccdf power law intercept and time.. - CDF(Outdegree)... Outdegree Figure 6: F (d) for February 2 topologies. 5

6 5 5 VC /n Figure 7: Vertex Cover of the Internet versus Inet-2.2 over time done in Inet-2.2. In Fig. 6, we compare F (d) of a February 2 Internet topology against Inet-3. and Inet-2.2 topologies of equal size. As shown in Fig. 6, we see that Inet-3. matches the degree distribution of the Internet even more faithfully than does Inet-2.2. In Section 4 we compare the ccdf plots for two other size topologies, both showing similar results. 3.2 Connectivity - vertex cover Throughout this paper, we will refer to vertex cover as the ratio V C /n, where V C is the number of nodes in the minimum vertex cover, and n is the number of nodes in the graph. This form allows us to compare graphs of different sizes. Finding the minimum vertex cover of a graph is an NP-hard problem. We use a well-known heuristic for approximating the minimum vertex cover of a graph. The heuristic is a greedy algorithm that builds a vertex cover by iteratively adding the node which covers the most remaining uncovered edges in the graph. A discrepancy between the vertex cover of Inet-2.2 topologies and Internet topologies was first noted by Park et al. [9]. They reported that the vertex cover of Inet-2.2 topologies was about 5% larger than the vertex cover of the Internet. This difference is clearly seen in Fig. 7 which plots the vertex cover of the Internet over the 5 months of our data set, versus Inet-2.2 topologies of equal sizes. Even more disturbing is that we see the difference in vertex cover values to be increasing over time to a difference of over % in early 22. As was seen above, the degree distribution of Inet-2.2 topologies is quite similar to the degree distribution of the Internet, even before modifications made in Inet-3.. For a set of nodes with specified degrees, there are many ways of connecting these nodes. This leads us to believe the discrepancy in vertex cover was a result of Inet-2.2 s connectivity process. The process of connecting nodes in Inet-2.2 consists of three steps as follow:. Build a spanning tree with all nodes that have degrees greater than. Let G be the graph to be generated, initially empty. Randomly, with uniform probability, a node with degree larger than that is not in G is connected to a node in G with linear preference, namely, the probability of connection to a node in G is d/d, where d is the degree of the node in G, and D is the sum of degrees of all nodes already in G that still have at least one free degree. 2. Next, we connect all nodes with degree to nodes in G with linear preference. 6

7 Target AS vertex degree (Internet) Target AS vertex degree (Model) New AS ID Figure 8: Actual target node s degree(s) New AS ID Figure 9: Target node s degrees(s) by the linear preferential model. 3. Finally, we connect the remaining free degrees in G, starting from the node with the largest degree first. In making these connections, we randomly pick nodes with free degrees using linear preference. Before we attempted to analyze Inet-2.2 s connectivity process, we first tested a few simple, intuitive ad-hoc modifications to the three steps listed above: It has been noted that the top -5 ASs on the Internet form a mesh, and that all other ASs are within an average of 3 hops of an AS in the mesh. Our modification consisted of first forming an initial mesh of the -5 nodes with the highest degrees. Then when building the spanning tree, attempt to insure that every node would be connected so that it was at most 3 hops away from at least one node in the mesh. This method, while feasible, showed to be ineffective in changing the value of the vertex cover. When connecting a node, attempt to connect it only to a node with higher degree. This proves to be infeasible in step 3 of the Inet connectivity process, as we describe below in more detail. As none of these heuristics effected the vertex cover property of Inet-2.2 topologies, a somewhat less ad-hoc approach was needed. In step 3 of the Inet connectivity process, free degrees are filled in, starting with the node with the largest degree. This implies that when the free degrees of a node with degree d are to be filled in, there will be no nodes with degree greater than d that have free degrees. What this translated to was that many low degree nodes were forced to connect to other low degree nodes. In a practical sense, this seems to be a problem, because on the Internet, smaller stub-ass are more likely to be connected to larger transit-ass. In [2] the authors show that new ASs in the Internet have a greater preference to connect to high degree ASs than is predicted by linear preference. Fig. 9, taken from [2], shows that, nodes (x-axis) added to a snapshot of the Internet sequentially using linear preferential model shows a higher probability of connecting to low degree target nodes (y-axis) than exhibited in the historical data, Fig. 8. Under the linear preference model, despite the preference for high degree target nodes, the sheer number of low degree nodes (two thirds of the ASs on the Internet have degree 2), means that a large number of new nodes ended up connecting to a low degree node. To quantify this intuitive understanding of Internet connectivity, we ask, for a node with a certain degree, what is the degree distribution of its neighbors? For example, what degree ASs does the highest degree node on the Internet connect to, as well as, what degree ASs do degree 2 ASs connect to? We plotted the cumulative degree distribution of a node s neighbors F (d) = d i= f(d) where f(d) is simply 7

8 the frequency of neighbors with degree d. We plotted F (d) for nodes with degrees, 2, 3, and 4, as well as for the top 4 ASs. Figs. and show these distributions for the Internet on February, 2 versus an Inet-2.2 topology of equal size (8765 nodes). We quickly observe significant deviations between the Internet and Inet-2.2 distributions. Our initial suspicion that low degree nodes are connecting to too many other low degree nodes in Inet-2.2, is firmly substantiated by these plots. For example, in this Inet-2.2 topology, almost 35% of degree 2 nodes neighbors have degree less than or equal to 3. This is in sharp contrast to the Internet topology where only 5% of degree 2 nodes neighbors have degree less than or equal to 3. Conversely, when we examine the distributions of the top degree nodes, we see that top degree nodes in the Inet-2.2 topology do not connect to as many low degree nodes as in the Internet. For example, about 45% of the nodes neighboring the second largest node 2 in the Inet-2.2 topology has degree 3 or less. This again is in sharp contrast to the Internet topology where 75% of the second largest node s neighbors have degree 3 or less. Very similar results were found for a variety of topology sizes. The lowest degree nodes and the highest degree nodes connect far more often in the Internet topology than they do in an Inet-2.2 topology. Intuitively, if a topology has many small degree nodes connected to each other, these connections need to be covered by one of the small degree nodes in the vertex cover. Adding these small degree nodes increases the vertex cover as they do not cover many edges. Under linear preference, the probability of a node i connecting to a node j is simply a function of the degree of node j, whereas from our understanding of AS relationships in the Internet, and the empirical data shown in Figs. and, it appears that the probability of a node i connecting to a node j is a function of the degrees of both nodes i and j. If the degrees of nodes i and j are very different, the probability that they connect to each other should be higher than linear preference. If the degrees of nodes i and j are close, we leave the preference linear. A natural way to achieve this desired function would be to weight the original linear preference function with a factor of the distance between the degrees of the two nodes being considered. We use the Frequency-Outdegree power law to set this weight to be the Euclidean distance between the two degrees on the log-log plot. Let d i and d j be the degrees of nodes i and j respectively, and f(d i ) and f(d j ) be the frequency of those degrees. Then w j i is the weighted value of d j with respect to d i, and is defined as: ( w j i = MAX, log d ) 2 ( i + log f(d ) 2 i) d j. (3) d j f(d j ) Then P (i, j), the probability that a node i with degree d i connects to a node j of degree d j is: P (i, j) = w j i k G wk i. (4) In Inet-3., whenever we need to connect a degree of a node i, we use P (i, j) to calculate the probability that it connects to another node j. Guided by our observations of Internet connectivity, this simple change has profound changes on the connectivity of nodes in Inet-3. compared to Inet-2.2. Fig. 2 shows the plot of V C /n over time. Here we see the value V C /n of Inet-3. topologies closely matches that of Internet topologies for all sizes of topologies. Figs. 3 and 4 show the new neighbor degree distributions for Inet-3. compared to Inet-2.2 and the Internet for February 2, and Figs. 5 and 6 show the distributions for February 22. We see that the neighbor degree distributions of Inet-3. topologies are much closer to those of the Internet in Figs. 3 and 4. The results are not quite as dramatic when we examine topologies from February 22 in Figs. 5 and 6. For the February 22 topologies, which have about 2,7 nodes, we see in a few cases for low 2 In both topologies this node has a degree well over. 8

9 .. a. for nodes with degree. b. for nodes with degree 2... c. for nodes with degree 3. d. for nodes with degree 4. Figure : Cumulative Distribution of Neighbors Frequency for -4 Nodes. a. for the largest node.. b. for 2nd largest node.. c. for 3rd largest node.. d. for 4th largest node. Figure : Cumulative Distribution of Neighbors Frequency for Top 4 Nodes 9

10 5 5 VC /n Figure 2: Vertex Cover over time degree nodes that Inet-3. overcompansates for the problems seen in Inet-2.2. That is, low degree nodes are seen to connect to too few low degree nodes compared to on the Internet. This again stresses the need for a better understanding of Internet connectivity and metrics to fully describe the connectivity. In the next section, we examine several other metrics to show the improvements of Inet-3. over Inet Further Analysis In this section we examine the topologies generated by Inet-3. along several additional metrics. When applicable, we compare Inet-3. to Inet-2.2 and the Internet over the 5 topology sizes of our Internet data set. For other metrics, this time based comparison is not feasible, in such cases, we use 3 snapshots of the Internet topologies, from February 2, February 2, and February 22. These topologies have sizes of approximately 67, 888, and 27 nodes, respectively. Below we describe the various characteristics we examined. Outdegree versus rank power law. The first power law identified in [3] was d v rv R, where d v is the degree of a node v, r v is the rank of node v on a sorted list in decreasing order of node degree, and R is a constant. Fig. 9 shows that Inet-3. plot is almost identical to that of the Internet, an improvement over Inet-2.2. Pair size within h hops. The neighborhood size, A v (h), of an AS v within h hops is the number of ASs reachable within h hops from v. Pair size within h hops, P (h), is then the sum of all ASs neighborhood sizes within h hops. It was shown in [5] that P (h) follows an exponential growth law defined as: P t (h) = e s ht P (h) where P (h) is the pair size within h hops in November 997, s h is the pair size growth rate, and t is the number of months since 997. Fig. 8 show the pairsize within, 2, 3, and 4 hops. We see both Inet-2.2 and Inet-3. follow the Internet data closely. Resilience. Resilience R(n) is defined in [2] to be the average minimum cut-set size within an n-node ball around any node in the topology. Simply, resilience characterizes the robustness of a graph by measuring the average number of alternate paths between all pairs of nodes in the topology. Fig. 2 shows that Inet-2.2, Inet-3., and Internet topologies all show similar resilience. Normalized Laplacian spectrum of a graph. It is shown in [3] that the normalized laplacian spectrum (nls) is a much more discriminating and descriptive metric than the largest eigenvalues of the adjacency matrix of a graph. Coming from the field of spectral graph theory, the (nls) is related to Internet graphs in [3], where they define the normalized Laplacian of the graph G to be the matrix

11 .. a. for nodes with degree. b. for nodes with degree 2... c. for nodes with degree 3. d. for nodes with degree 4. Figure 3: Cumulative Distribution of Neighbors Frequency for -4 Nodes, Feb. 2.. a. for the largest node. b. for 2nd largest node... c. for 3rd largest node. d. for 4th largest node. Figure 4: Cumulative Distribution of Neighbors Frequency for Top 4 Nodes, Feb. 2

12 .. a. for nodes with degree. b. for nodes with degree 2... c. for nodes with degree 3. d. for nodes with degree 4. Figure 5: Cumulative Distribution of Neighbors Frequency for -4 Nodes, Feb a. for the largest node. b. for 2nd largest node... c. for 3rd largest node. d. for 4th largest node. Figure 6: Cumulative Distribution of Neighbors Frequency for Top 4 Nodes, Feb. 22 2

13 L(G) where: if u = v and d v, L(G)(u, v) = dud if u and v are adjacent, v otherwise. the nls is then just the set of eigenvalues of L(G). Vukadinovi`c et al. show a large discrepancy between the nls plot of Inet-2.2 and Internet topologies in [3]. Much to our appreciation, the authors ran their spectral analysis on Inet-3. topologies. This analysis showed the nls plot of Inet-3. to be very similar to that of the Internet, a large improvement over Inet-2.2. Characteristic (or Average) Path Length. For each node, calculate its average shortest path distance to all other nodes in the topology. Average path length is then the average of these distances for all nodes. This metric has been described in [4], [], and [6]. Fig. 2 shows that both Inet-2.2 and Inet-3. have similar characteristic path lengths over time compared to the Internet. Average Eccentricity. This metric measures the diameter of a graph. The eccentricity of a node is the maximum distance from the node to all other nodes in the graph. Average eccentricity is the average of all nodes eccentricity. Fig. 22 shows that Inet-3. topologies have an average eccentricity that is more consistent and much closer to the average eccentricity of the Internet compared to Inet-2.2. Distortion. This metric comes from graph theory literature [4], but was related to Internet topologies in [2]. Distortion measures how much a spanning tree distorts the distances between adjacent nodes in the original graph. It measures how tree-like a topology is. Fig. 23 shows that Inet-2.2, Inet-3., and Internet topologies all show similar distortion. Maximum Clique Size. A clique C is a set of nodes that are all pairwise adjacent. The maximum clique size of a graph is just the size of the largest clique in the graph. Finding the maximum clique in a graph is an NP-hard problem, but there are many well-known approximation algorithms []. Fig. 24 highlights the most significant known deficiency with Inet-3. topologies. The maximum clique size in Inet-3. is consistently about half as large as the maximum clique size of the Internet. In this one case, we also see Inet-3. performs worse than Inet-2.2 in matching the characteristics of the Internet. As problems with vertex cover were a primary motivation for investigation into Internet connectivity and modification for Inet-3., these limitations with maximum clique size will drive further analysis of Internet connectivity and will be discussed in future research. Clustering Coefficient. Like characteristic path length, the clustering coefficient has been popularized by the interest in small-world graphs [4], and has been used to characterize Internet topologies in [, 7]. The clustering coefficient is a measure of how many of a nodes neighbors are adjacent to each other. This is calculated for all nodes and averaged. Fig. 25 shows the other known problem with Inet-3. topologies. We believe that this problem with clustering coefficient is closely related to the smaller maximum clique sizes mentioned above. Consider the following scenario in the Internet; if a small, degree 2 AS is multi-homed to two large ASs that peer with each other, this degree 2 AS will have a clustering coefficient of. As a significant percentage of ASs are small ASs that are multi-homed to large, transit ASs who are peers of each other, there will be a significant percentage of ASs with a clustering coefficient of. This will clearly result in the large clustering coefficient we see on the Internet. In Inet-3., we lack the large, dense clique of the top degree nodes that we see on the Internet. With a smaller maximum clique of top degree nodes, it is less likely that a small node will be multi-homed to two large nodes that are peers of each other, and we therefore have a smaller clustering coefficient in Inet-3. topologies. Again, this issue will be investigated, and reported in future work. 3

14 5 Conclusion and Future Work As our analysis shows, Inet-3. performs as well as or better than Inet-2.2 in terms of matching the characteristics of Internet topologies. We have improved upon degree distribution and minimum vertex cover size, as was our intention initially. We have uncovered two (related) problems with the connectivity of Inet-3. topologies though, in terms of maximum clique size and clustering coefficient. This emphasizes the need for a better understanding of Internet connectivity, which has proven to be much harder to quantify than degree distribution. Our future work will address these limitations in density in Inet-3. topologies. We thank Thomas Erlebach, Polly Huang, Damien Magoni, Hongsuda Tangmunarunkit, and Danica Vukadinovi`c for their assistance in analyizing our topologies, and Amnon Shochat for discussion regarding vertex cover and a script to approximate the minimum vertex cover of Inet graphs. 4

15 .. - CDF(Outdegree). - CDF(Outdegree).... Outdegree a. February, 2.. Outdegree b. February, 22. Figure 7: Additional ccdf of Frequency versus Outdegree e+8 Number of Host Pairs Number of Host Pairs e+7 e a. Pair Size within hop b. Pair Size within 2 hops. e+8 e+9 Number of Host Pairs e+7 Number of Host Pairs e+8 e+7 "Inet-3.s36" e a. Pair Size within 3 hops. e b. Pair Size within 4 hops. Figure 8: Pair Sizes within h hops over time. 5

16 Outdegree of AS Outdegree of AS Rank of Outdegree Rank of Outdegree a. February, 2. b. February, 2. Outdegree of AS Rank of Outdegree a. February, 22. Figure 9: Outdegree versus Rank power law. Resilience Resilience Ball Radius Ball Radius a. February, 2. b. February, 2. Resilience Ball Radius a. February, 22. Figure 2: Resilience. 6

17 Average Path Length Average Eccentricity Figure 2: Characteristic path length over time. Figure 22: Average eccentricity over time Distortion 3 Distortion Ball Radius a. February, 2. Ball Radius b. February, Distortion Ball Radius a. February, 22. Figure 23: Distortion. 7

18 Maximum Clique Size Inet 3. Inet 2.2 Internet clustering coeff Figure 24: Maximum clique size over time Figure 25: Clustering coefficient. References [] T. Bu and D. Towsley. On distinguishing betweem internet power law topology generators. In In. Proc. of IEEE INFOCOM, 22. [2] Q. Chen, H. Chang, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. The origin of power laws in internet topologies revisited. In In. Proc. of IEEE INFOCOM, 22. [3] M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proc. of ACM SIGCOMM, pages , 999. [4] T.C. Hu. Optimum communication spanning trees. SIAM Journal of Computing 3, pages 88 95, 974. [5] C. Jin, Q. Chen, and S. Jamin. Inet: Internet topology generator. Tech.rep.cse-tr-433-, University of Michigan EECS Dept., 2. [6] D. Magoni and J.J. Pansiot. Analysis of the autonomous system network topology. ACM SIGCOMM Computer Communication Review, pages 26 37, July 2. [7] A. Medina, I. Matta, and J Byers. On the origin of power laws in internet topologies. ACM SIG- COMM Computer Communication Review, April 2. [8] NLANR. National laboratory for applied network research. [9] K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. In In. Proc. of ACM SIGCOMM, 2. [] M. Pelillo. Heuristics for maximum clique and independent set. [] Routeviews.org. The university of oregon route views archive project. [2] H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Willinger. Network topology generators: -based vs. structural. In In. Proc. of ACM SIGCOMM, 22. 8

19 [3] D. Vukadinovi`c, P. Huang, and T. Erlebach. A spectral analysis of the internet topology. Eth tiknr.8, Swiss Federal Institute of Technology (ETH), 2. [4] D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, pages , June

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

Computer Network Topologies: Models and Generation Tools

Computer Network Topologies: Models and Generation Tools Consiglio Nazionale delle Ricerche Technical Report n. 5/200 Computer Network Topologies: Models and Generation Tools Giuseppe Di Fatta, Giuseppe Lo Presti 2, Giuseppe Lo Re CE.R.E. Researcher 2 CE.R.E.,

More information

An Incremental Super-Linear Preferential Internet Topology Model

An Incremental Super-Linear Preferential Internet Topology Model An Incremental Super-Linear Preferential Internet Topology Model Extended Abstract Sagy Bar 1, Mira Gonen 2, and Avishai Wool 3 1 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978,

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,

More information

Scaling Properties of the Internet Graph

Scaling Properties of the Internet Graph Scaling Properties of the Internet Graph Aditya Akella Shuchi Chawla Arvind Kannan Srinivasan Seshan Computer Science Department Carnegie Mellon University Pittsburgh, PA 53 {aditya,shuchi}@cs.cmu.edu

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

Comparing the structure of power-law graphs and the Internet AS graph

Comparing the structure of power-law graphs and the Internet AS graph 1 Comparing the structure of power-law graphs and the Internet AS graph Sharad Jaiswal, Arnold L. Rosenberg, Don Towsley Computer Science Department Univ. of Massachusetts, Amherst {sharad,rsnbrg,towsley}@cs.umass.edu

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Internet Topology of the Power-Laws

Internet Topology of the Power-Laws Power-Laws and the AS-level Internet Topology Georgos Siganos,Michalis Faloutsos,Petros Faloutsos,Christos Faloutsos Abstract In this paper, we study and characterize the topology of the Internet at the

More information

On Realistic Network Topologies for Simulation

On Realistic Network Topologies for Simulation On Realistic Network Topologies for Simulation Oliver Heckmann, Michael Piringer, Jens Schmitt, Ralf Steinmetz Multimedia Communications (KOM), Department of Electronic Engineering & Information Technology

More information

Comparing Trade-off Based Models of the Internet

Comparing Trade-off Based Models of the Internet Fundamenta Informaticae 92 (2009) 363 372 363 DOI 10.3233/FI-2009-79 IOS Press Comparing Trade-off Based Models of the Internet Anthony Spatharis, Ilias Foudalis, Martha Sideri Computer Science Department

More information

The Internet Is Like A Jellyfish

The Internet Is Like A Jellyfish The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Evolution of the Internet AS-Level Ecosystem

Evolution of the Internet AS-Level Ecosystem Evolution of the Internet AS-Level Ecosystem Srinivas Shakkottai, Marina Fomenkov 2, Ryan Koga 2, Dmitri Krioukov 2, and kc claffy 2 Texas A&M University, College Station, USA, sshakkot@tamu.edu, 2 Cooperative

More information

Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

More information

On the Eyeshots of BGP Vantage Points

On the Eyeshots of BGP Vantage Points On the Eyeshots of BGP Vantage Points Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bin Liu Northwestern University, Tsinghua University, University of Illinois at Chicago {kchen, ychen}@northwestern.edu,

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

The Origin of Power Laws in Internet Topologies Revisited

The Origin of Power Laws in Internet Topologies Revisited The Origin of Power Laws in Internet Topologies Revisited Qian Chen Hyunseok Chang Ramesh Govindan Sugih Jamin Department of EECS Department of EECS ICSI Department of EECS University of Michigan University

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003 On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude

More information

Small-World Internet Topologies

Small-World Internet Topologies Small-World Internet Topologies Possible auses and Implications on Scalability of End-System Multicast Shudong Jin Azer Bestavros omputer Science Department Boston University Boston, MA 0225 jins,best@cs.bu.edu

More information

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies.. The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

More information

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

More information

Network Topologies, Power Laws, and Hierarchy

Network Topologies, Power Laws, and Hierarchy Network Topologies, Power Laws, and Hierarchy Hongsuda Tangmunarunkit USC-ISI Ramesh Govindan USC-ISI Sugih Jamin Univ. of Michigan Scott Shenker ACIRI Walter Willinger AT&T Abstract It has long been thought

More information

Applying Social Network Analysis to the Information in CVS Repositories

Applying Social Network Analysis to the Information in CVS Repositories Applying Social Network Analysis to the Information in CVS Repositories Luis Lopez-Fernandez, Gregorio Robles, Jesus M. Gonzalez-Barahona GSyC, Universidad Rey Juan Carlos {llopez,grex,jgb}@gsyc.escet.urjc.es

More information

Network Topology Generators: Degree-Based vs. Structural

Network Topology Generators: Degree-Based vs. Structural Network Topology Generators: Degree-Based vs. Structural Hongsuda Tangmunarunkit USC-ISI hongsuda@isi.edu Ramesh Govindan ICSI ramesh@icsi.berkeley.edu Sugih Jamin Univ. of Michigan jamin@eecs.umich.edu

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Effective Network Monitoring

Effective Network Monitoring Effective Network Monitoring Yuri Breitbart, Feodor Dragan, Hassan Gobjuka Department of Computer Science Kent State University Kent, OH 44242 {yuri,dragan,hgobjuka}@cs.kent.edu 1 Abstract Various network

More information

Characterizing the Internet Hierarchy from Multiple Vantage Points

Characterizing the Internet Hierarchy from Multiple Vantage Points Characterizing the Internet Hierarchy from Multiple Vantage Points Lakshminarayanan Subramanian, Sharad Agarwal, Jennifer Rexford, Randy H. Katz Report No. UCB/CSD-1-1151 August 2001 Computer Science Division

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

ModelingandSimulationofthe OpenSourceSoftware Community

ModelingandSimulationofthe OpenSourceSoftware Community ModelingandSimulationofthe OpenSourceSoftware Community Yongqin Gao, GregMadey Departmentof ComputerScience and Engineering University ofnotre Dame ygao,gmadey@nd.edu Vince Freeh Department of ComputerScience

More information

The Structure of an Autonomic Network

The Structure of an Autonomic Network doi:1.198/rspa.27.182 Published online Radial structure of the Internet BY PETTER HOLME 1, *, JOSH KARLIN 1 AND STEPHANIE FORREST 1,2 1 Department of Computer Science, University of New Mexico, Albuquerque,

More information

Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006

Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Placing BGP Monitors in the Internet UCLA Computer Science Department - Techical Report TR-060017-2006 Abstract Ricardo Oliveira Mohit Lad Beichuan Zhang rveloso@cs.ucla.edu mohit@cs.ucla.edu bzhang@cs.arizona.edu

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Collecting the Internet AS-level Topology

Collecting the Internet AS-level Topology Collecting the Internet AS-level Topology Beichuan Zhang, Raymond Liu Computer Science Dept. UCLA {bzhang, raymondl}@cs.ucla.edu Daniel Massey Computer Science Dept. Colorado State University massey@cs.colostate.edu

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

The Connectivity and Fault-Tolerance of the Internet Topology. Christopher R. Palmer Georgos Siganos Michalis Faloutsos

The Connectivity and Fault-Tolerance of the Internet Topology. Christopher R. Palmer Georgos Siganos Michalis Faloutsos The Connectivity and Fault-Tolerance of the Internet Topology Abstract Christopher R. Palmer Georgos Siganos Michalis Faloutsos Computer Science Department, U.C. Riverside, U.C. Riverside, Carnegie Mellon

More information

Jellyfish: A Conceptual Model for the AS Internet Topology

Jellyfish: A Conceptual Model for the AS Internet Topology Jellyfish: A Conceptual Model for the AS Internet Topology Georgos Siganos U. C. Riverside siganos@cs.ucr.edu Sudhir L. Tauro U. C. Riverside stauro@cs.ucr.edu Michalis Faloutsos U. C. Riverside michalis@cs.ucr.edu

More information

Internet Topology. Yihua He yhe@cs.ucr.edu Michalis Faloutsos michalis@cs.ucr.edu. University of California, Riverside. Glossary 2.

Internet Topology. Yihua He yhe@cs.ucr.edu Michalis Faloutsos michalis@cs.ucr.edu. University of California, Riverside. Glossary 2. Internet Topology Yihua He yhe@cs.ucr.edu Michalis Faloutsos michalis@cs.ucr.edu Georgos Siganos siganos@cs.ucr.edu University of California, Riverside Contents Glossary 2 1 Definition 2 2 Introduction

More information

Statistical theory of Internet exploration

Statistical theory of Internet exploration Statistical theory of Internet exploration Luca Dall Asta, 1 Ignacio Alvarez-Hamelin, 1,2 Alain Barrat, 1 Alexei Vázquez, 3 and Alessandro Vespignani 1,4 1 Laboratoire de Physique Théorique, Bâtiment 210,

More information

Social Networks and Social Media

Social Networks and Social Media Social Networks and Social Media Social Media: Many-to-Many Social Networking Content Sharing Social Media Blogs Microblogging Wiki Forum 2 Characteristics of Social Media Consumers become Producers Rich

More information

Search Heuristics for Load Balancing in IP-networks

Search Heuristics for Load Balancing in IP-networks Search Heuristics for Load Balancing in IP-networks Mattias Söderqvist Swedish Institute of Computer Science mso@sics.se 3rd March 25 SICS Technical Report T25:4 ISSN 11-3154 ISRN:SICS-T--25/4-SE Abstract

More information

Link Prediction in Social Networks

Link Prediction in Social Networks CS378 Data Mining Final Project Report Dustin Ho : dsh544 Eric Shrewsberry : eas2389 Link Prediction in Social Networks 1. Introduction Social networks are becoming increasingly more prevalent in the daily

More information

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs.

BGP route propagation. Internet AS relationships, Routing policy on Internet paths. Example of commercial relationship. Transit vs. BGP route propagation Internet AS relationships, Routing policy on Internet paths Z. Morley Mao Lecture 5 Jan 20, 2005 Connectivity does not imply reachability Not all possible routes propagate Commercial

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

A Study of Internet Routing Stability Using Link Weight

A Study of Internet Routing Stability Using Link Weight A Study of Internet Routing Stability Using Link Weight Mohit Lad Jong Han Park Tiziana Refice Lixia Zhang ABSTRACT The global Internet routing infrastructure is a large scale distributed system where

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Studying E-mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information

Studying E-mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information Studying E-mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka Bülent Yener Department of Computer Science,

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery Middle-East Journal of Scientific Research 15 (9): 1264-1271, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11480 Efficient Doubletree: An Algorithm for Large-Scale Topology

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce M. Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. Carnegie Mellon and Akamai Tech.

More information

Six Degrees of Separation in Online Society

Six Degrees of Separation in Online Society Six Degrees of Separation in Online Society Lei Zhang * Tsinghua-Southampton Joint Lab on Web Science Graduate School in Shenzhen, Tsinghua University Shenzhen, Guangdong Province, P.R.China zhanglei@sz.tsinghua.edu.cn

More information

! ". The maximum distance between a node and the nearest center in is then at most, and the number of centers needed is.

! . The maximum distance between a node and the nearest center in is then at most, and the number of centers needed is. To appear in IEEE Infocom 2. On the Placement of Internet Instrumentation Sugih Jamin Cheng Jin Yixin Jin Department of EECS Department of EECS Computer Science Department University of Michigan University

More information

Data Caching in Networks with Reading, Writing and Storage Costs

Data Caching in Networks with Reading, Writing and Storage Costs Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: hgupta@cs.sunysb.edu Bin Tang Computer

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

Mining Social-Network Graphs

Mining Social-Network Graphs 342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is

More information

Network Topology and Traceroutes

Network Topology and Traceroutes A Distributed Approach to End-to-End Network Topology Inference Xing Jin Qiuyan Xia S.-H. Gary Chan Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting

More information

The ebay Graph: How Do Online Auction Users Interact?

The ebay Graph: How Do Online Auction Users Interact? The ebay Graph: How Do Online Auction Users Interact? Yordanos Beyene, Michalis Faloutsos University of California, Riverside {yordanos, michalis}@cs.ucr.edu Duen Horng (Polo) Chau, Christos Faloutsos

More information

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

Importance of IP Alias Resolution in Sampling Internet Topologies

Importance of IP Alias Resolution in Sampling Internet Topologies Importance of IP Alias Resolution in Sampling Internet Topologies Mehmet Hadi Gunes Department of Computer Science University of Texas at Dallas Email: mgunes@utdallas.edu Kamil Sarac Department of Computer

More information

Efficient Search in Gnutella-like Small-World Peerto-Peer

Efficient Search in Gnutella-like Small-World Peerto-Peer Efficient Search in Gnutella-like Small-World Peerto-Peer Systems * Dongsheng Li, Xicheng Lu, Yijie Wang, Nong Xiao School of Computer, National University of Defense Technology, 410073 Changsha, China

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics

Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Tracers Placement for IP Traceback against DDoS Attacks

Tracers Placement for IP Traceback against DDoS Attacks Tracers Placement for IP Traceback against DDoS Attacks Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-Min Yu, Wen Ouyang, Ching-Hsien Hsu, and Yu-Guang Chen Department of Computer Science and Information

More information

Random Flow Network Modeling and Simulations

Random Flow Network Modeling and Simulations ICC 03 1 Random Flow Network Modeling and Simulations for DDoS Attack Mitigation Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu Lu Computer Science Department, University

More information